Yesterday was the second Tuesday of the month that means our support team have been reviewing our client monitoring reports and the SOC to check that the Microsoft Patch Tuesday updates have been completed. They will keep an eye on the reports all day to check there are no issues …
“View Document”
Sometimes a cyber-attack is something as easy as adding a button saying “view document” when whale phishing senior people in an organisation. Ongoing Microsoft Azure account hijacking campaign targets executives (bleepingcomputer.com) Your takeaway When was the last time you audited the credentials and associated authorisations of those credentials? If you …
The truth about keyloggers and how easy it is to get the unwary to download one…
This is an excellent article by Xavier Mertens, with a video that demonstrates how a keylogger on your computer will defeat even the most complex of passwords. A Python MP3 Player with Builtin Keylogger Capability – SANS Internet Storm Center Your takeaway from this Have a policy in place stating …
Continue reading “The truth about keyloggers and how easy it is to get the unwary to download one…”
Let’s start the week with a Mac attack
I wrote about an Apple Mac attack last week – Macs too… – and we are going to start the week off with a Mac attack. Let me just quote the article here: “Still today, many people think that Apple and its macOS are less targeted by malware. But the …
Macs too…
I can still remember sitting in client meeting listening to the then minority Mac owners explain to me that Macs did not get hacked or get viruses. Of course, what they did not understand was that hackers then could not be bothered with Macs as there were far more juicy …